• Publications
  • Influence
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory
TLDR
We developed a theoretical model based on both deterrence and social bond theories rooted in a social control perspective to better understand employee behaviour in this context. Expand
  • 153
  • 24
  • PDF
KDD CUP-2005 report: facing a great challenge
TLDR
The KDD-Cup 2005 Competition was held in conjunction with the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Expand
  • 116
  • 17
  • PDF
High-Accuracy and Fast-Speed MPPT Methods for PV String Under Partially Shaded Conditions
TLDR
The photovoltaic (PV) string under partially shaded conditions exhibits complex output characteristics, i.e., the current–voltage <inline-formula> <tex-math notation="LaTeX">$(I\mbox{--}V)$</tex-Math></inline- formula> curve presents multiple current stairs, whereas the power-voltage curve shows multiple power peaks . Expand
  • 107
  • 15
  • PDF
Optical CDMA via temporal codes
TLDR
The authors provide an analysis of the performance of optical orthogonal codes in an optical code division multiple access (CDMA) network by considering the probability distribution of interference patterns. Expand
  • 235
  • 14
Construction and Block Error Rate Analysis of Polar Codes Over AWGN Channel Based on Gaussian Approximation
  • D. Wu, Y. Li, Yue Sun
  • Mathematics, Computer Science
  • IEEE Communications Letters
  • 30 May 2014
TLDR
Polar codes are usually constructed to minimize the upper bound of a block error ratio (BLER). Expand
  • 118
  • 13
Detecting online commercial intention (OCI)
TLDR
We focus our attention on capturing commercial intention from search queries and Web pages, i.e., when a user submits the query or browse a Web page, whether he/she is about to commit or in the middle of a commercial activity, such as purchase, auction, selling, paid service, etc. Expand
  • 147
  • 12
  • PDF
DaVinci: dynamically adaptive virtual networks for a customized internet
TLDR
This paper uses optimization theory to show that adaptive resource allocation can be stable and can maximize the aggregate performance across the virtual networks. Expand
  • 156
  • 12
  • PDF
Fundamentals of Heterogeneous Cellular Networks with Energy Harvesting
TLDR
We develop a new tractable model for K-tier heterogeneous cellular networks (HetNets), where each base station (BS) is powered solely by a self-contained energy harvesting module. Expand
  • 183
  • 10
  • PDF
Data-Driven Grasp Synthesis Using Shape Matching and Task-Based Pruning
TLDR
We introduce a novel shape matching algorithm that matches hand shape to object shape by identifying collections of features having similar relative placements and surface normals. Expand
  • 151
  • 10
  • PDF
A Construction of General QAM Golay Complementary Sequences
  • Y. Li
  • Computer Science
  • IEEE Transactions on Information Theory
  • 2010
TLDR
A construction of general quadrature amplitude modulation (QAM) Golay complementary sequences based on quadratures phase shift keying Golay-Davis-Jedwab sequences . Expand
  • 61
  • 10
...
1
2
3
4
5
...